Skip to content

Commit 694385e

Browse files
authored
Merge pull request #97083 from MicrosoftDocs/master
11/25 AM Publish
2 parents 95931aa + 86a2481 commit 694385e

File tree

66 files changed

+2342
-364
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+2342
-364
lines changed

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,9 @@ For users synchronized from an on-premises AD DS environment using Azure AD Conn
5656
5757
Once appropriately configured, the usable password hashes are stored in the Azure AD DS managed domain. If you delete the Azure AD DS managed domain, any password hashes stored at that point are also deleted. Synchronized credential information in Azure AD can't be reused if you later create an Azure AD DS managed domain - you must reconfigure the password hash synchronization to store the password hashes again. Previously domain-joined VMs or users won't be able to immediately authenticate - Azure AD needs to generate and store the password hashes in the new Azure AD DS managed domain. For more information, see [Password hash sync process for Azure AD DS and Azure AD Connect][azure-ad-password-sync].
5858

59+
> [!IMPORTANT]
60+
> Azure AD Connect should only be installed and configured for synchronization with on-premises AD DS environments. It's not supported to install Azure AD Connect in an Azure AD DS managed domain to synchronize objects back to Azure AD.
61+
5962
## Forests and trusts
6063

6164
A *forest* is a logical construct used by Active Directory Domain Services (AD DS) to group one or more *domains*. The domains then store objects for user or groups, and provide authentication services.

articles/active-directory-domain-services/overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,9 @@ Let's look at an example for Litware Corporation, a hybrid organization that run
9393
* Litware's IT team enables Azure AD DS for their Azure AD tenant in this, or a peered, virtual network.
9494
* Applications and VMs deployed in the Azure virtual network can then use Azure AD DS features like domain join, LDAP read, LDAP bind, NTLM and Kerberos authentication, and Group Policy.
9595

96+
> [!IMPORTANT]
97+
> Azure AD Connect should only be installed and configured for synchronization with on-premises AD DS environments. It's not supported to install Azure AD Connect in an Azure AD DS managed domain to synchronize objects back to Azure AD.
98+
9699
### Azure AD DS for cloud-only organizations
97100

98101
A cloud-only Azure AD tenant doesn't have an on-premises identity source. User accounts and group memberships, for example, are created and managed directly in in Azure AD.

articles/active-directory-domain-services/synchronization.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,9 @@ The following table illustrates how specific attributes for group objects in Azu
9595

9696
Azure AD Connect is used to synchronize user accounts, group memberships, and credential hashes from an on-premises AD DS environment to Azure AD. Attributes of user accounts such as the UPN and on-premises security identifier (SID) are synchronized. To sign in using Azure AD Domain Services, legacy password hashes required for NTLM and Kerberos authentication are also synchronized to Azure AD.
9797

98+
> [!IMPORTANT]
99+
> Azure AD Connect should only be installed and configured for synchronization with on-premises AD DS environments. It's not supported to install Azure AD Connect in an Azure AD DS managed domain to synchronize objects back to Azure AD.
100+
98101
If you configure write-back, changes from Azure AD are synchronized back to the on-premises AD DS environment. For example, if a user changes their password using Azure AD self-service password management, the password is updated back in the on-premises AD DS environment.
99102

100103
> [!NOTE]

articles/active-directory-domain-services/tutorial-configure-password-hash-sync.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,9 @@ To authenticate users on the managed domain, Azure AD DS needs password hashes i
5050

5151
Azure AD Connect can be configured to synchronize the required NTLM or Kerberos password hashes for Azure AD DS. Make sure that you have completed the steps to [enable Azure AD Connect for password hash synchronization][enable-azure-ad-connect]. If you had an existing instance of Azure AD Connect, [download and update to the latest version][azure-ad-connect-download] to make sure you can synchronize the legacy password hashes for NTLM and Kerberos. This functionality isn't available in early releases of Azure AD Connect or with the legacy DirSync tool. Azure AD Connect version *1.1.614.0* or later is required.
5252

53+
> [!IMPORTANT]
54+
> Azure AD Connect should only be installed and configured for synchronization with on-premises AD DS environments. It's not supported to install Azure AD Connect in an Azure AD DS managed domain to synchronize objects back to Azure AD.
55+
5356
## Enable synchronization of password hashes
5457

5558
With Azure AD Connect installed and configured to synchronize with Azure AD, now configure the legacy password hash sync for NTLM and Kerberos. A PowerShell script is used to configure the required settings and then start a full password synchronization to Azure AD. When that Azure AD Connect password hash synchronization process is complete, users can sign in to applications through Azure AD DS that use legacy NTLM or Kerberos password hashes.

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,8 @@ The synchronization of a password has no impact on the Azure user who is signed
158158
If you use Azure AD Domain Services to provide legacy authentication for applications and services that need to use Keberos, LDAP, or NTLM, some additional processes are part of the password hash synchronization flow. Azure AD Connect uses the additional following process to synchronize password hashes to Azure AD for use in Azure AD Domain Services:
159159

160160
> [!IMPORTANT]
161+
> Azure AD Connect should only be installed and configured for synchronization with on-premises AD DS environments. It's not supported to install Azure AD Connect in an Azure AD DS managed domain to synchronize objects back to Azure AD.
162+
>
161163
> Azure AD Connect only synchronizes legacy password hashes when you enable Azure AD DS for your Azure AD tenant. The following steps aren't used if you only use Azure AD Connect to synchronize an on-premises AD DS environment with Azure AD.
162164
>
163165
> If your legacy applications don't use NTLM authentication or LDAP simple binds, we recommend that you disable NTLM password hash synchronization for Azure AD DS. For more information, see [Disable weak cipher suites and NTLM credential hash synchronization](../../active-directory-domain-services/secure-your-domain.md).

articles/app-service/app-service-web-tutorial-php-mysql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: web
1313
ms.tgt_pltfrm: na
1414
ms.devlang: php
1515
ms.topic: tutorial
16-
ms.date: 11/15/2018
16+
ms.date: 11/25/2019
1717
ms.author: cephalin
1818
ms.custom: mvc
1919
ms.custom: seodec18

articles/app-service/containers/tutorial-php-mysql-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: app-service-web
88
ms.workload: web
99
ms.devlang: php
1010
ms.topic: tutorial
11-
ms.date: 03/27/2019
11+
ms.date: 11/25/2019
1212
ms.author: cephalin
1313
ms.custom: mvc
1414
ms.custom: seodec18
@@ -265,7 +265,7 @@ Open _config/database.php_ and add the _sslmode_ and _options_ parameters to `co
265265
'mysql' => [
266266
...
267267
'sslmode' => env('DB_SSLMODE', 'prefer'),
268-
'options' => (env('MYSQL_SSL')) ? [
268+
'options' => (env('MYSQL_SSL') && extension_loaded('pdo_mysql')) ? [
269269
PDO::MYSQL_ATTR_SSL_KEY => '/ssl/BaltimoreCyberTrustRoot.crt.pem',
270270
] : []
271271
],

articles/app-service/web-sites-traffic-manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can use Azure Traffic Manager to control how requests from web clients are d
3030
## Routing methods
3131
Azure Traffic Manager uses four different routing methods. These methods are described in the following list as they pertain to Azure App Service.
3232

33-
* **[Priority](../traffic-manager/traffic-manager-routing-methods.md#priority):** use a primary app for all traffic, and provide backups in case the primary or the backup apps are unavailable.
33+
* **[Priority](../traffic-manager/traffic-manager-routing-methods.md#priority-traffic-routing-method):** use a primary app for all traffic, and provide backups in case the primary or the backup apps are unavailable.
3434
* **[Weighted](../traffic-manager/traffic-manager-routing-methods.md#weighted):** distribute traffic across a set of apps, either evenly or according to weights, which you define.
3535
* **[Performance](../traffic-manager/traffic-manager-routing-methods.md#performance):** when you have apps in different geographic locations, use the "closest" app in terms of the lowest network latency.
3636
* **[Geographic](../traffic-manager/traffic-manager-routing-methods.md#geographic):** direct users to specific apps based on which geographic location their DNS query originates from.

articles/automation/automation-windows-hrw-install.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: This article provides information on installing an Azure Automation
44
services: automation
55
ms.service: automation
66
ms.subservice: process-automation
7-
author: bobbytreed
8-
ms.author: robreed
9-
ms.date: 05/21/2019
7+
author: mgoedtel
8+
ms.author: magoedte
9+
ms.date: 11/25/2019
1010
ms.topic: conceptual
1111
manager: carmonm
1212
---
-633 Bytes
Loading

0 commit comments

Comments
 (0)